Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross.

Slides:



Advertisements
Similar presentations
Class Discussion. Suppose your parents told you that they were going to give you an allowance and open a bank account for you. And, if you managed your.
Advertisements

Part I: Making Good Online Choices
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Internet Safety/Cyber Ethics
The Cloud is Safe Pract The Facts. Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker.
Internet Security Passwords.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Internet safety By Lydia Snowden.
How To Protect Your Privacy and Avoid Identity Theft Online.
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Identity theft: Real or Virtual? By: Alex Metzler.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is it? How do I avoid it?
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Chris.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
According to netiquette simply refers to our behavior the internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Company LOGO Internet Safety By: Melissa Pinnell.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.

INTERNET SAFETY FOR KIDS
Internet Safety Internet Safety LPM
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
You. are at risk for the fastest growing crimes crime.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
InformatiOn Technology Services
Scams & Schemes Common Sense Media.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Introduction to Computers
start to finish – November 20181
InformatiOn Technology Services
Lesson 2- Protecting Yourself Online
Company Name | Phone Number | Website | Address
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross

Passwords ● They are important ● Why ● The most important after your bank login details are your ● Had an from a friend in holiday who has their wallet and passport stolen? – Stranded Traveler Appeal Scams – scams.html

XKCD No. 936

So words are better ● Up to point ● Web sites still catching up – Many only allowing so many letters (characters) – And blocking the use of punctuation ● Mistakes made every year – Sony 2011 – 1 Million usernames & passwords – Target 2013 – 40 million credit cards

Passwords ● Have to be hard and fit for purpose – – Passwords and Access → Website Password ● Ideas and tools can be found on this page

Mark Burnett’s six rules ● Password, 1234, letmein, and anything else that you see on this common passwords cloud are not passwords ● If you google your password and get more than 10,000 results, it is not a password ● If your password is 8 characters or less, it is not a password ● If you use it on multiple sites, it is no longer a password ● If a password is older than 3 years, it has expired and is no longer a password ● If you tell someone your password, it is no longer a password

Password/Passphrase ● What can go into most password systems? ● These are called characters NOT letters ● Letters are only A-Z and a-z ● Characters include numbers 0-9 ● Characters SHOULD but don't always include ● -+!”£$%^&*()-=., ● This is a security weakness of many sites

Ideas for passphrases ● Things that nearly only you know ➢ What was your first car? ➢ What was the colour? ➢ Which year did you buy or get given it? ➢ The publishing date of your favourite novel? ➢ What food do you not like? ➢ Put punctuation characters in

KeePass ● Use a password manager – Back the password file up – Most passwords can be reset by ● Write down the master password! ● Most techies use KeePass –

Identity Theft ● How to protect yourself ● Three major UK credit agencies ● Notice of correction –